About this Community
Welcome to the CSER MOOC “CyberSecurity & Awareness” Community! This Community is for participants enrolled in the CSER “CyberSecurity &am..
Unit 3_Question 1
This unit has provided interesting information regarding to information systems safety and cryptography, that are very helpful for me. I h..
Unit 3 – Question 1
This unit is so interesting and informative to me. I have been provided with a lot of knowledge, for example: information systems, apps an..
Unit 3 – Question 1
In this unit I have been shared some examples of how information can be extracted from data. Although the information provided can bring b..
Unit 3 – Question 1
In this unit, I have been shared some examples of how information can be extracted from data.
Although the information provided can bri..
Unit 3 – Question 1
In this unit, I have been shared some examples of how information can be extracted from data.
Although the information provided can bri..
Unit 3 – Question 1
Unit 3 shared a few examples of how information can be extracted from data such as using an application that generates the data (GPS, goog..
Unit 3 – Question 1
In modern life, there are thousands of ways that people can leave information traces by using technology. For example, during a transactio..
Unit 3 – Question 1
In this lesson, I have been sharing some examples of information and data. For example, the information extracted from available data such..
unit 2
In my opinion, the three concepts are interrelated and deal with protecting users and the systems from digital attacks.
However, there ex..
Unit 5 – Question 1
Share with us your top 5-10 code of ethics statements for using technology in the classroom or your professional workplace.
Code of eth..
You must be logged in to post a comment.